• Tokens Hard, Soft And What’s In Between - Secret Double Octopus

Tokens – Hard, Soft And What’s In Between

Proving your identity in order to authenticate yourself and gain access to some kind of system, is more of a challenge than most people realize. This process has to be designed so that on one hand it’s as easy as possible for the user of the system to gain access, while on the other it’s as difficult as possible for someone [...]

  • Certification as single point of failure - secret double octopus

Circumventing The Single Point of Failure – Goals in Authentication

Securing our online communications has always been an ongoing task, one that has to stay in-synch with our ever-expanding communication technology. For years, the basis of this security has been Secure Sockets Layer (SSL) cryptography, now in its more updated version of Transport Layer Security (TLS). These protocols work by generating keys for every connection made between parties (say, your internet [...]

  • Identity Security

Taking on the Growing Threat to Identity Security

The need for a robust identity security and access management (IAM) strategy is one of the central concerns of securing enterprise IT. Strong identity solutions can help firms boost their productivity by streamlining user access in additional to strengthening the overall security of the organization. But with identity theft steadily on the rise in recent years, resulting in billions in losses [...]